Implementing CIM With Top Secret
search cancel

Implementing CIM With Top Secret

book

Article ID: 53756

calendar_today

Updated On:

Products

Top Secret

Issue/Introduction

Does Top Secret have any type of support for CIM? This appears to be a resource class in IBM RACF per the Common Information Users Guide, v1.9, IBM PUB#SC33-7998.

Resolution

Here are the generic steps for the CIM implementation:

  1. Define the WBEM resource class to the RDT (Resource Descriptor Table) via:
    TSS ADDTO(RDT) RESCLASS(WBEM) ACLST(ALL=FFFF,CONTROL=C400,UPDATE=C000,READ=4000,NONE=0000)

  2. Own the necessary resources via:
    TSS ADD(dept) WBEM(CIMSERV)
    TSS ADD(dept) SURROGAT(BPX.SRV) (may have already been done)

  3. Create the region acid and define the started task to the started task table via:
    TSS CREATE(CIMSERV) TYPE(USER) NAME('CIMSERV Region Acid') PASS(xxxx,0) DEPT(dept)
    TSS PERMIT(CIMSERV) WBEM(CIMSERV) ACC(CONTROL)
    TSS PERMIT(CIMSERV) SURROGAT(BPX.SRV)
    TSS ADDTO(STC) PROCNAME(CFZCIM) ACID(CIMSERV)

  4. Permit access to the users, for example, CIMUSR, via:
    TSS PERMIT(CIMUSR) WBEM(CIMSERV) ACC(READ)
    TSS PERMIT(CIMSERV) SURROGAT(BPX.SRV.CIMUSR) ACC(READ)